CVE-2014-3499

Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:docker:docker:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

History

13 Feb 2023, 00:40

Type Values Removed Values Added
Summary CVE-2014-3499 docker: systemd socket activation results in privilege escalation Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-3499', 'name': 'https://access.redhat.com/security/cve/CVE-2014-3499', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2014:0820', 'name': 'https://access.redhat.com/errata/RHSA-2014:0820', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 20:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-3499 -
  • (MISC) https://access.redhat.com/errata/RHSA-2014:0820 -
Summary Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. CVE-2014-3499 docker: systemd socket activation results in privilege escalation

Information

Published : 2014-07-11 14:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3499

Mitre link : CVE-2014-3499

CVE.ORG link : CVE-2014-3499


JSON object : View

Products Affected

fedoraproject

  • fedora

docker

  • docker
CWE
CWE-264

Permissions, Privileges, and Access Controls